secure, distributed,
anonymous, p2p?
ComfyCon AU 2025
Jim Cheetham / @yojimbo@hackers.town
Jim, unix/network hacker
Federated via @yojimbo@hackers.town
Yojimbosan [RSC] on ComfyCon Discord
$dayjob security for Modica Group, CPaaS
We only have 30 minutes ...
not Signal, Telegram, Tor, IPFS ...
A framework to write and run apps
A protocol to provide a co-operative secure network
A mechanism for storing data on that network
designed for mobile devices first, because that's where the users are
therefore expecting high node churn and varied capabilities
very cross-platform; runs on Linux, MacOS, Windows, Android, iOS and WASM
a way to break away from the centralised, cost-oriented Internet
a projekt from cDc - the Cult of the Dead Cow,
Medus4 (Katelyn Bowden) & DilDog (Christien Rioux)
Veilid's mascot is Ellet (he/them), a brick
Because you can build wonderful things with bricks,
they're all basically the same as each other,
and if you throw one at the right place & time ...
veilid-core in Rustveilid-server APIVeilid uses the Internet (UDP, TCP, Websockets)
But remains in its own network - no external services, no STUN/TURN, no DNS*
Privacy design guards your IP address
* DNS used for initial node bootstrap only
Every Veilid node has the same capabilities
They all store private data securely
They all store shared data securely
They all route data on behalf of each other
They are all unreliable
A node's capabilities are measured, not claimed
Data storage is redundant, and refreshes often based on use
Stale/unused data expires over time
Nodes don't want to expose their IP addresses
You can communicate directly with other nodes ...
But you can also use "Safety Route" to mask outbound traffic
And a matching "Private Route" for inbound traffic, too
The Veilid Network
Meet Alice & Bob
Traditional direct p2p
Discovery of the 'best' route is implicit,
as is hole-punching, relaying, and STUN/TURN equivalent
BUT IP addresses are exposed between the two
Alice's Safety Route
Bob's Private Route
Maximum Anonymity
Routing Tables - every node tries to know ~256 others
Initial bootstrap via DNS provides ~20, then we ask those for more data
Route discovery to any node will iterate automatically
All nodes, regardless of OS, get the same options
On device :
On network :
Cryptography
(don't panic)
Rolling upgrades can be used
VLD0 is in use right now
VLD1 is coming to address PQ issues
256 bit keyspaces
Privacy is a human right
"Social media shouldn't be monetised; Users are not a commodity"
Developers no longer have to monetise their own users, just to pay their cloud bills
Veilid is the technical substrate
Run veilid-server on your servers
Join the community via veilid.com
Ask questions, suggest ideas, be thoughtful
Help improve things! Documentation, code, publicity ...
Write an app that uses Veilid rather than a centralised model
Cult of the Dead Cow - hacktivism and Veilid itself

ELLET and Veilid logo from The Veilid project website
Hackers.Town - support and sanity checking (not a cult)
brick by Bernar Novalyi from Noun Project (CC BY 3.0)
Slides via revealjs